Course Catalog
Hands-on offensive security training.
Ridgeback courses are built for people who want to understand offensive tools by using them: operators, analysts, red teamers, builders, and defenders sharpening their assessment instincts.
Available formats: live in-person, live virtual, and on-demand. Live classes fill up quickly; early registration is recommended. Want a live class but do not see one scheduled? Email training@ridgebackinfosec.com.
Choose Your Path
Start with the foundational course if you are building confidence with offensive tooling. Jump into the operator course when you are ready for deeper workflow, customization, and multi-stage scenarios.
Choose OTF if you want a structured first pass through offensive tools.
Best for newer learners, defenders building attacker context, and practitioners who want confidence with command-line driven assessment workflows.
- You want the fundamentals explained clearly
- You prefer an 8-hour course with approachable labs
- You are not yet comfortable chaining tools together
Choose OTO if you are ready to think and work like an operator.
Best for pentesters, red teamers, analysts, and students who already know the basics and want deeper methodology, workflows, and tool adaptation.
- You have some offensive security experience
- You want multi-stage scenarios and operator tradecraft
- You are comfortable troubleshooting in technical labs
Offensive Tooling Foundations
For students who want a practical, structured introduction to the tools and techniques used by security professionals during offensive assessments.
OTF covers the basics of common offensive tools: what they do, how they are configured, when they are useful, and how to practice responsibly in safe lab environments.
Good fit for
- Newer offensive security learners
- Defenders who want attacker-tool context
- Practitioners building command-line confidence
You will work toward
- Understanding tool functionality and configuration
- Executing hands-on labs in controlled environments
- Applying ethical hacking principles
Prerequisites
- Basic networking concepts
- Familiarity with Windows and Linux command lines
- General cybersecurity awareness
- No prior offensive security experience required
Included
- Certificate of completion
- Lab exercises and scenarios
- Course slides, VMs, and reference materials
- Support from experienced instructors
Offensive Tooling for Operators
For practitioners ready to go deeper into offensive methodology, operator workflows, multi-stage attack scenarios, scripting, and tool customization.
OTO focuses on practical application: how professional operators approach targets, chain techniques, adapt tools, and reason through offensive workflows.
Good fit for
- Operators and red teamers
- Analysts who want deeper adversary context
- Students comfortable with offensive basics
You will work toward
- Understanding operator methodology and workflow
- Executing multi-stage attack scenarios
- Building stronger technical offensive instincts
Prerequisites
- Familiarity with basic offensive security concepts
- Some experience with common offensive tools
Included
- Certificate of completion
- Virtual machines with tools and targets
- Course slides, links, and lab instructions
- Support from experienced instructors
Why Attend Live?
On-demand is convenient, but live classes add immediacy, discussion, and direct interaction with the instructor.
Ask questions as they come up and get immediate answers from the instructor.
Work alongside peers tackling the same challenges and trade notes as you go.
Chris teaches live classes personally, with demos and context from real assessment work.
A scheduled class creates accountability and keeps you moving through the labs.
Questions before you register?
Review course differences, access details, equipment requirements, recordings, certificates, and private training options in the FAQ.
Ready to get hands-on?
Choose the foundational path, step into operator workflows, or reach out about a live cohort for your group.
